Movatterモバイル変換


[0]ホーム

URL:


US6011849A - Encryption-based selection system for steganography - Google Patents

Encryption-based selection system for steganography
Download PDF

Info

Publication number
US6011849A
US6011849AUS08/919,203US91920397AUS6011849AUS 6011849 AUS6011849 AUS 6011849AUS 91920397 AUS91920397 AUS 91920397AUS 6011849 AUS6011849 AUS 6011849A
Authority
US
United States
Prior art keywords
key
data
encryption
selection key
selection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US08/919,203
Inventor
Steven M. Orrin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Syndata Technologies Inc
Original Assignee
Syndata Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Syndata Technologies IncfiledCriticalSyndata Technologies Inc
Priority to US08/919,203priorityCriticalpatent/US6011849A/en
Assigned to SYNDATA TECHNOLOGIES, INC.reassignmentSYNDATA TECHNOLOGIES, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ORRIN, STEVEN M.
Priority to EP98953158Aprioritypatent/EP1033008A2/en
Priority to AU10604/99Aprioritypatent/AU1060499A/en
Priority to PCT/US1998/017839prioritypatent/WO1999010859A2/en
Application grantedgrantedCritical
Publication of US6011849ApublicationCriticalpatent/US6011849A/en
Assigned to GARFIELD GROUP, LC, THEreassignmentGARFIELD GROUP, LC, THEEXECUTION LEVY VIA JUDGMENTAssignors: SYNDATA TECHNOLOGIES, INC.
Assigned to GARFIELD GROUP, LC THEreassignmentGARFIELD GROUP, LC THEEXECUTION LEVY VIA JUDGMENTAssignors: SYNDATA TECHNOLOGIES, INC.
Anticipated expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A data security system which produces a steganographic selection key by using an encryption key as both the key and as the data to be encrypted. First an encryption key is copied multiple times to form a data block which is then encrypted using the same key. The resulting ciphertext is then used as a selection key to select locations in a secondary data stream. These selected locations are then modified with the original data to be encoded. Restoration of the original data is accomplished by using the selection key to locate the modified areas of the data stream, extracting the data found there, and then decrypting the extracted data with the cyphertext.

Description

CROSS REFERENCE TO RELATED APPLICATIONS
The subject matter hereof is related to that set forth in U.S. patent application Ser. No. 08/919,190, entitled "Steganography System for Secure Data", U.S. patent application Ser. No. 08/919,212, entitled "Combined Encryption and Steganography System for Secure Data", and U.S. patent application Ser. No. 08/919,366, entitled "Data Backup Using Encryption and Steganograpy", each filed on an even date herewith, naming the same inventor hereof, and assigned to the same assignee hereof, the disclosures of all of which are incorporated herein by reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention relates to digital data security technologies and communications and more particularly to a method and apparatus for securing data and permitting secure electronic communications relying on encryption and steganographic techniques.
2. Description of the Related Technology
Information and data transfer is growing at an alarming rate. The need for data security has also grown at an equal if not greater speed. The core problems that need to be addressed by any data security system are level of security, ease of use, integratability within the work environment, and mass/global level usage. By contrast, electronic communications are inherently insecure and open. Confidential and proprietary information and data are transferred regularly through channels which are in need of a secure and user-friendly methodology to facilitate confidentiality. Presently there are two basic approaches to securing information: access control (such as password protection), and encryption (single key, dual key, One Time Pad (OTP), steganography, and hardware). Each of these methods has its own advantages and disadvantages pertaining to implementation, design, level of security, interoperability, development, ease of use, and widespread adoption, use, and appeal.
Password protection is commonly used for access control but has inherent security level shortcomings when applied to data security.
Encryption has been implemented in five basic methodologies:
(a) Single key encryption--This uses an encryption algorithm along with an encryption key to encrypt and decrypt data. The same key is used in both encoding and decoding. The major shortcoming of single key technology is the transference of the key to the recipient. Most methodologies require a separate secure communication of the key to the recipient/decoder, via either fax, telephone or in person.
(b) Dual key encryption--Public key encryption solves this problem by utilizing different keys for encryption and decryption. The encryption-public key is given out insecurely to all potential encoders. The decryption-private key is kept by the recipient/decoder and not given out. Encryption is performed on data using the public key and only the private key can decode the data encrypted using its matching public half. Public key technology is primarily based on factorials of large prime numbers that facilitate the public and private key halves. There are presently several patents relating to public key technology, such as those held by RSA (U.S. Pat. No. 4,405,829) and Diffie-Hellman (U.S. Pat. No. 4,200,770). Presently, there are three shortcomings to the public key system in a large network. First, a repository capable of storing millions of public keys needs to be in place to facilitate Internet level global communications security. Second, due to the nature of public keys, they require large streams of data, and a method of authentication needs to be in place to validate the authenticity of the public keys within the repository. Third is the present difficulty and lack of ease of use inherent in today's public key products.
(c) One Time Pad (OTP) is an encryption methodology that provides a high level of security for encrypted information. However, due to its reliance on truly random sequences for the initialization key and the inability of software to provide truly random numbers, OTP is not suitable for the mass market of end users and corporate users for secure communications.
(d) Hardware encryption cards and boxes have been used for secure communications. Hardware encryption provides high level security and key management but is very costly. In addition, hardware encryption systems have not been compatible with other hardware systems, i.e. they lack interoperability. Hardware encryption is ideal for point to point communications or closed systems where cost is not a factor; they range from $1,000-$25,000 in cost. Hardware encryption systems are typically not suitable for open or mass communication applications.
(e) Steganography is a relatively new method for data security. Steganography, the art and science of hiding the existence of information, has in the past been primarily associated with invisible inks, messages sent via telephone line noise known as TranSec, and red cellophane such as that used in games to reveal information hidden in a red-blue block. Within the past two years, Steganography has migrated to the computer in the form of hiding information in graphical images, sound files, or other media including text files such as Mimic functions. Mimic functions convert plaintext letters into common everyday English words that are then put together to form pseudo-sentences. The resulting message resembles a Madlib™. When steganography is applied to graphic images, it encodes information in the code of a graphic file either in the pixel coding, high bits, or low bits of the coding. The former is useful for small messages but becomes apparent if large amounts of data are hidden. The latter two are more recent but are still in development stages as the encoding generates a noticeable deviation from the standard code of the graphics file. An example of a steganographic system is described by Cooperman et al. (U.S. Pat. No. 5,613,004), which is herein incorporated by reference in its entirety. All of these methods lose their security when the system is known and therefore should be used together with key based encryption for additional security.
SUMMARY OF THE INVENTION
This system features a data security method that combines the strength of encryption with the strength of steganography. According to the invention, a software or hardware package may provide both a secure method of communications via electronic communications systems and a secure work environment for data. The features and processes utilized in the invention deliver a cohesive standard by which data can be secured. Further the invention features an easy to use interface that is cohesive with standard protocols and procedures within both the corporate and individual environments. Finally, the interface combined with the high level of security and functionality lends mass market and global level appeal to the invention.
It is an object of the invention to provide an encryption and security program for a personal computer system such as those using the Windows environment. It is a further object to provide an easy-to use interface, and an easy-to-integrate environment. It is a further object to provide for file and document encryption, including selective partial document encryption; combined encryption and steganography for super secure domestic and secure international communications; multiple overwrite for deleted files; Digital Signatures for providing sender verification and document integrity validation; active document blanking for roaming eyes protection in impersonal or hostile work environments; steganographic key management; key list transfers; file compression; a secure key list back-up facility; administrative features; and unique registration and distribution features. Of course, the system also includes provisions for recovering the encrypted and encoded information.
Once the data has been encrypted and/or steganographically encoded, it may be transmitted to another system, kept in the present system, stored on a media, or any combination of those choices. Because of the exposed nature of most communications methods, the greatest need for such security is usually for transmitted data.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows a flow diagram of the encryption process.
FIG. 2 shows a flow diagram of public key distribution.
FIG. 3 shows a flow diagram of the process of combining encryption with steganography.
FIG. 4 shows a flow diagram of the steganographic selection algorithm process for generation of the selection algorithm.
FIG. 5 shows a flow diagram of the process of steganographically encoding data into a stream of data bits.
FIG. 6 shows an illustration of the floating toolbar user interface.
FIG. 7 shows a flow diagram of combining encryption and steganography for the purpose of secure backup to removable media, as may be used for storage of personal or administrator keys.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
A system according to the invention may encrypt files and documents with a choice of multiple algorithms and methods. One preferred embodiment may be designed with a modular open-ended architecture in an object-oriented scheme that allows the easy insertion of any encryption algorithm, including both single key and public key algorithms. The invention may utilize the modular design with flags that alert the program to the encryption method used for simple decryption and easy upgrade to multiple encryption algorithms and methods. Each algorithm is treated as a modular process that fits into the predefined call of the program. The program calls provide for a key(s) and input/output of data, thereby allowing for any encryption algorithm to be plugged in once configured to meet the specifications of the program calls.
The preferred embodiment uses a two-step process: an encryption algorithm(s) creates the ciphertext, which is then steganographically secured. Both conventional single key encryption and hybrid public/single key encryption systems can be used here. Since multiple types of encoding are contained in the system, each type using potentially different types of keys, key management is also a major feature. The flow charts of FIGS. 1-5 and 7 show the various processes involved in the system.
FIG. 1 shows the basic encryption process. Instep 2 the data is input into the system through any suitable method (file selection or from within an application via a floating toolbar button as illustrated in FIG. 6), where key management is performed instep 3. Key management can be the insertion of a key by the user, a selected key from a key list, or other key selection methodology including randomly generated keys. The key(s) is then used by the encryption process ofstep 4 to encrypt the retrieved data. The encryption method used is determined by a configuration performed by the user or by a preset default. An encrypted message, or ciphertext, is produced atstep 5 as a result of this process. If only basic encryption is desired, the process can end here with the ciphertext being returned to either a file or back into the application the original data came from. However, for greater security and/or innocuous messaging the ciphertext can be subjected to further encoding techniques, as described later.
FIG. 2 shows the basic key transfer process utilized by the invention when distributing keys for use in a public key encryption system. Instep 7, public keys are selected from a list or database for transfer. Keys are digitally signed by the sender's signing key instep 8 and transferred in step 9 via electronic mail, a network system, or saved to a file for manual transfer. Upon receiving the transferred keys, the recipient system authenticates them using existing public keys, and the recipient's local database of keys is updated instep 10 with the transferred keys. This process enables users to utilize public key encryption as described in FIG. 1 for encryption of data and also for key authentication using a horizontal trust model.
FIG. 3 shows a two-step encoding process, with encryption followed by steganographic encoding. Steps 12 through 14 correspond tosteps 2 through 4 in FIG. 1, which produce a ciphertext through standard encryption techniques as described earlier. Instep 15, a steganographic selection algorithm (SSA) uses the ciphertext in a bit-to-byte correspondence for selection of replaceable characters/bytes. The replacement produces the steganographically encoded result at step 17. The details of this process are expanded in FIGS. 4 and 5.
FIG. 4 shows the details of the steganographic selection algorithm (step 15 of FIG. 3), which uses an encryption key as both a key and as data to be encrypted. A key is chosen in step 19, either randomly generated or chosen by the user, and repeatedly copied instep 20 until the result is the same size as the data stream or media which will be steganographically modified. This result is then encrypted in step 21 with the same key to produce a selection ciphertext. In step 22, each bit of the selection ciphertext is then associated with a byte (or pixel, or other suitable unit) in the data stream. The selected data stream bytes are those whose associated bit in the ciphertext is a logic `1` (or alternately, a logic `0`). In a preferred embodiment, every data stream byte has an associated bit in the selection ciphertext, but for greater security only every nth byte can have an associated bit. While this selection algorithm is described in the context of steganographic data encoding, it can also be used for any other selection applications in which the selected units are to remain secret.
FIG. 5 shows the details of the steganographic encoding process (step 16 of FIG. 3). The data to be encoded is brought in atstep 25, and in step 26 each bit of this data is associated with a selected byte in the data stream or media to be modified. The data stream or media can be a random number stream, multimedia file such as a graphic image or sound file, a text document, or some other form of data. In step 27 the media is brought in for association with the bits in step 26. Using the selection algorithm developed in FIG. 4, the least significant bit of each selected byte is replaced in step 28 by the corresponding data bit from step 26. This newly modified data stream or media represents the encoded steg-stream of step 29 which produces the secured message shown in step 17 of FIG. 3.
This process can also be described in mathematical terms. The steganographic selection algorithm is a reproducible random selection process utilizing ciphertext as the selection operand, where:
k=any key
d=any target data
n=length in bytes of target data
θ=S.sub.(X)
S.sub.(X) =A selection of x ##EQU1##
The invention utilizes an encryption algorithm and resulting ciphertext to enable a selection of data. The selection, f0 (), is performed on the data, d, based on the bits from the resulting ciphertext, fx (k), where k is the encryption key and fx () is the process by which the key is used as both the encryption key and the plaintext, created by fr (), fr () takes the encryption key, k, and copies it back to back such that the resulting plaintext is equivalent in size, n, to the target data, nd, to be selected from. fc () uses the encryption key, k, to encrypt the plaintext resulting from fr (), or knd. The resulting ciphertext, (knd)k, is then used in a bit-to-data comparison to facilitate selection of units where d is the target data to be selected from and x is the selecting bit from the ciphertext. Either a 1 or 0 can be used as the selecting bit. dx is the resulting selected units from the data.
The steganographic encoding process can be described mathematically by the following:
m=any medium
d=original data
n=length in bits of original data
fs ()=a selection process
fl ()=a least significant bit conversion
fs2s (m, m'd)=m"
fs (m)=m'
fl (m',d0-n(d))=m'd
This process of encoding data within other data can be facilitated by the use of:
(1) any medium, or data stream into which the original data will be encoded, such as that produced by a pseudo random number generator (PRNG);
(2) the selection process;
(3) a key to feed the selection process; and
(4) the original data, to be encoded into the medium.
The invention performs a least significant bit conversion on the medium where the bits from the original data are then inserted into selected bytes of the medium at the least significant bit position. The selection of bytes from the medium is performed by some selection process, such as an algorithm, character key, or other method.
As an example, a random stream generated by a PRNG can be used as the medium. Data is encoded or hidden in the stream by converting the least significant bits from selected bytes of the medium into the bits from the original data, whether in plaintext or ciphertext form.
An example of an encoding is as follows:
Object: Hide the word "it."
The bit sequence for the word "it" is: 01101001 01110100.
The original PRNG stream:
aku245q9S53'%14hj2q356@$%d070c6*&56)(noiury24r0q34ikjh3982h' H*37Hqdhg(dg&h#daghhhaead43y3q8uQ#8y3d203emape3m'zd+w[2oh[2
Selection of the characters to be converted (underlined):
aku245q9S53'%14hj2q356@$%d070c6*&56)(noiury24r0q34ikjh3982h' H*37Hqdhg(dg&h#daghhhaead43y3q8uQ#8y3d203emape3m'zd+w[2oh[2
The bit sequences of the characters selected:
______________________________________                                    a      q        j        d       n      i01100001                                                                         01110001 01101010 01100100                                                                          01101110                                                                         01101001i      h01101001                                                                         01101000                                                           H      *        q        #       8p                                 01001000                                                                         00101010 01110001 00100011                                                                          00111000                                                                         01110000                          m      [                                                                  01101101                                                                         01011011                                                           ______________________________________
The bit sequence for the word "it," 01101001 01110100, is hidden in the selected byte sequences by least significant bit conversion:
______________________________________                                    01100000                                                                         01110001 01101011 01100100                                                                          01101111                                                                         01101000                          01101000                                                                         01101001                                                           01001000                                                                         00101011 01110001 00100011                                                                          00110010                                                                         01110001                          01101100                                                                         01011010                                                           ______________________________________
The characters represented by the new byte sequences are:
'qkdohhiH+q#8ql\
These characters are now placed back into the stream from whence they came, giving a new data stream (the replacement characters are underlined):
'ku245q9S53'%14hk2q356@$%d070c6*&56)(oohury24r0q34hkjh3982i' H+37Hqdhg(dg&h#daghhhaead43y3q8uQ#8y3d203emaqe3l'zd+w[2oh\2
The file to be `stegged`, i.e., the data stream in which the message will be hidden, is selectable by the user. This file can be in many formats, but for effective security it should be the type of file that can be modified without such modification being obvious. In addition to the PRNG file previously mentioned, other preferred formats are: graphics (BMP, GIF, JPG, etc.), sound (WAV, RA, AIF, MIDI, etc.), and video (MPG, MOV, etc.). Depending on the degree of modification, these files might be usable for graphics, sound, or video in their modified form without noticeable performance degradation, thus further obscuring the fact that they contain encoded data.
The system also has a number of other features which give the user a range of selectable security functions:
Toolbar User Interface (TUI)--The system utilizes a floating toolbar that gives the user simple accessibility to security functions throughout the operating system environment. FIG. 6 shows an example of selections available from the toolbar. Item 31 is the toolbar's handle which enables both the drag and docking of the toolbar in the environment and, by right mouse clicking on the handle, allows for the configuration of the toolbar and other setup options. Items 32a and 32b are the encrypt and decrypt buttons which allow users to select both files and data from outside the application to be encrypted by the invention. Item 33 is the active window protection button. Item 34 is the place holder for other features configurable for use on the toolbar with the default being the exit function.
Selective Text Encryption--The system allows the user to highlight and select portions of the text, including paragraphs, sentences, even words, to be encrypted within a plaintext document. Delimiters are used so that a user decrypting the selected text does not have to identify its exact boundaries.
Secure Delete--In most computers, deleted files are still retrievable after deletion because only the file's index pointer information has been removed, whereas the file itself is still intact. The system provides a secure deletion facility that will overwrite a file first with a set such as all 0's and then with the set's compliment such as all 1's, and then with one or more overwrites of random data before deleting the file. This protects the user from having files retrieved from the drive after deletion. This function is selectable by the user.
Digital Signatures--The system provides Digital Signature capability to its users. Digital Signatures verify the origin and document integrity using one way hash functions and the Signing key belonging to the user. The system generates a hash sequence based on the contents of a document and then encrypts it with the Signing key. This sequence can be checked by the recipient to validate the sender and the contents of the document by decrypting the hash sequence using the verification key, packaged with the user's public key, and then comparing the hash of the document to the one contained in the Digital Signature. Digital Signatures can be used on both plaintext as well as ciphertext messages.
Partial Screen Blanking--This provides a secure work environment by covering most of the active window with a graphic image. The active window is protected up to approximately the last 3/4 inch of the window. The graphic image acts like a window shade and can be manipulated using the mouse to cover more or less of the active window. This allows the user to continue entering data and have the rest of the document secured from view. This feature is especially useful when the screen is in an unsecured area, where "roving eyes" can be a problem. Partial screen blanking toggles on and off via a button on the TUI and can also be set to require a key to be toggled off.
Key Management--The invention utilizes a special key management system incorporating public and single key technologies with Digital signatures and certificate formats, combined with ease of use to allow easy integration of a public key communication system without the need for a fully implemented public key infrastructure. The invention utilizes hybrid encryption. Data is encrypted using a Pseudo Random Number Generator (PRNG) generated session key to create the message ciphertext. The session key is then encrypted using either a recipient's public key (for transmission security), or a predetermined user local key (for storage security). A header is added to the message ciphertext containing the encrypted session key and other information necessary for decryption purposes. The other information contained in the header includes algorithm identifiers, file name, time and date information, sender name, and a digital signature if that option is selected. The header is divided into protected areas and clear text areas where protected areas are also encrypted and clear text areas are the minimum information needed to decrypt the header and message ciphertext upon receipt without undermining the security of the system.
Public keys are transferred between corespondents via a key transfer utility included in the invention that facilitates a transparent Internet and/or network-based transfer of public key information. The public keys are X.509 certificate formatted in compliance with the standards for compatibility with Certificate Authorities (CA's) and can also be digitally signed by the sender to provide a horizontal Web of Trust infrastructure. Transmitted public keys contain the public half of the public key pair, the verification key, sender username and e-mail address, and any authentication information available to the sender including previous senders' signatures and digital identifications provided by CA's. Public keys are maintained in a database where authentication information is also associated with each public key.
The user's secret information includes the user's private half of the public key pair, the user's signing key and the user's local encryption key. These are secured locally by the user.
The system allows the user to utilize encryption and steganographic capabilities to both secure data and allow for innocuous messaging. As described above, a message or file is encrypted and steganography is used to encode the encrypted file into a graphic image, sound or movie file.
File compression--A file compression utility is provided for the encrypted file to reduce file sizes.
Secure Backup on Removable Media--This provides a method by which users can back up and store off-line on removable media important data such as personal decryption keys, Administrator keys, key pairs, or other highly confidential information and data. As shown in FIG. 7, data is input into the system, encrypted, and then encoded onto the removable media. FIG. 7 illustrates this process using two floppy diskettes. In a preferred embodiment, this process can be performed to multiple floppies and onto almost any removable media such as recordable CD-ROMs, Zip Disks, Back Up Tapes, etc. It can also be used with multiple locations of remote or local non-removable storage, although this might provide a lesser degree of security. Instep 36 the data, which could consist of personal keys or Administrator public key pairs, is input into the system. Instep 37 key management is performed to determine the encryption key(s) for the data, such as a public key for a system administrator and a randomly generated session key. The data is then encrypted instep 38 using an encryption algorithm as in FIG. 1 utilizing the keys fromstep 37. Atstep 39 the encrypted data is split into files corresponding to the number of removable media to be used. This splitting function involves taking bytes from the encrypted data and placing them into separate files such that each byte is placed in a different file than its adjacent bytes. For example, if three files were to be created using the splitting process instep 39, and `abedefghijklmno` was the starting file to be stored, the resulting split files would be: `adgjm`, `behkn`, and `cfilo`. This process eliminates unwanted exposure of partial ciphertexts in the event that the security of one or more of the split files is compromised. Instep 40, each split file is written to selected sectors of its removable media. The key produced instep 37 is used to choose the exact sector(s) on the removable media where the files are written. The keys themselves can also be written to one or more of the removable media, such as the first one. Both file(s) and keys can be written without headers. In step 41 the removable media is written to by a pseudo-random number generator (step 43) to "fill" the remaining sectors of the media with random noise. This filling process writes the random data to all sectors of the removable media except those previously written to. The removable media now contains the split files of the encrypted data masked into random noise. This process represents another form of steganography, since it entails the `hiding` of sensitive data among other, non-sensitive data.
Retrieval of the hidden data can occur by effectively reversing the aforementioned process: Key management is first performed to retrieve the relevant key(s) from the media. Then each split file is retrieved using the proper key(s), the multiple split files are merged, and decryption is performed on the merged file. This is basically a reversal of steps 38-40.
Additional security can be provided through additional means, such as storing each of the backup media in a different location, physically securing the backup media, or keeping the key(s) separate from all the backup media. Such variations are obvious and the invention does not depend on their use.
Administrative Features--The system provides the network administrator or security administrator with several features tuned to the corporate environment. The Administrator can block access of employees to certain features of the system, including secure deletion, steganography, etc. The Administrator is also given the capability to gain emergency access to files and E-mails generated by users on the network.
Decryption--Obviously, every encryption method also includes a decryption capability. The decryption is generally the equivalent of an encryption operation in reverse. The system of this invention can decrypt any message encrypted by the aforementioned methods, using the decryption method appropriate for each type of encryption. Multi-encrypted data is decrypted in the reverse order in which it was encrypted, using any decryption information available from the message itself.
Various means of accomplishing the secure data features described herein are possible. Since most of the procedures involve the manipulation of digital data, the preferred embodiment uses software as a means to perform the described functions. The use of firmware, or a combination of software and firmware, is also envisioned. The preferred embodiment operates in the Windows environment due to the extremely broad market acceptance of the Windows operating system. But the invention will operate equally well in other environments, including single- or multi-user operating systems and single- or multi-processor systems.
The invention maybe embodied in other specific forms without departing from the spirit of the invention or its essential characteristics. The present embodiments are to be considered as illustrative and not restrictive, the scope of the invention being indicated by the following claims rather than by the foregoing description. All changes which come within the meaning and the range of equivalency of the claims are intended to be embraced herein.

Claims (12)

What is claimed is:
1. A method for selecting a plurality of discrete units with a secure selection key, said method comprising the steps of:
providing an encryption key;
copying said encryption key a plurality of times to form a data block;
encrypting said data block with said encryption key to form a selection key, said selection key comprising a plurality of bits;
providing a plurality of discrete units;
associating each bit of said selection key with one of said plurality of discrete units;
selecting only those discrete units whose associated bit has a particular logic state.
2. The method of claim 1, wherein the step of associating further comprises:
associating each bit of said selection key with every nth discrete unit, where n is an integer.
3. The method of claim 1, wherein said particular logic state is a logic `one`.
4. The method of claim 1, wherein said particular logic state is a logic `zero`.
5. The method of claim 1, wherein said discrete unit is a data byte.
6. The method of claim 1, wherein the number of bits in said selection key equals the number of discrete units.
7. A system for selecting a plurality of discrete units with a secure selection key, said system comprising:
an encryption key;
means for copying said encryption key a plurality of times to form a data block;
means for encrypting said data block with said encryption key to form a selection key, said selection key comprising a plurality of bits;
a plurality of discrete units;
means for associating each bit of said selection key with one of said plurality of discrete units;
means for selecting only those discrete units whose associated bit has a particular logic state.
8. The system of claim 7, wherein the means for associating further comprises:
means for associating each bit of said selection key with every nth discrete unit, where n is an integer.
9. The system of claim 7, wherein said particular logic state is a logic `one`.
10. The system of claim 7, wherein said particular logic state is a logic `zero`.
11. The system of claim 7, wherein said discrete unit is a data byte.
12. The system of claim 7, wherein the number of bits in said selection key equals the number of discrete units.
US08/919,2031997-08-281997-08-28Encryption-based selection system for steganographyExpired - Fee RelatedUS6011849A (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US08/919,203US6011849A (en)1997-08-281997-08-28Encryption-based selection system for steganography
EP98953158AEP1033008A2 (en)1997-08-281998-08-28Encryption system for secure data
AU10604/99AAU1060499A (en)1997-08-281998-08-28Encryption system for secure data
PCT/US1998/017839WO1999010859A2 (en)1997-08-281998-08-28Steganographic encryption system for secure data

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US08/919,203US6011849A (en)1997-08-281997-08-28Encryption-based selection system for steganography

Publications (1)

Publication NumberPublication Date
US6011849Atrue US6011849A (en)2000-01-04

Family

ID=25441698

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US08/919,203Expired - Fee RelatedUS6011849A (en)1997-08-281997-08-28Encryption-based selection system for steganography

Country Status (1)

CountryLink
US (1)US6011849A (en)

Cited By (133)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020001388A1 (en)*2000-06-072002-01-03Jung-Wan KoHigh speed copy protection method
US20020019934A1 (en)*2000-08-102002-02-14Toshikazu IshizakiEncryption and decryption apparatuses, methods, and computer program products
US20020108043A1 (en)*2001-02-022002-08-08Nec CorporationMethod and apparatus for encrypting and decrypting data using encrypting key contained in electronic watermark
US20020107804A1 (en)*2000-10-202002-08-08Kravitz David WilliamSystem and method for managing trust between clients and servers
US20020124177A1 (en)*2001-01-172002-09-05Harper Travis KellyMethods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US20020131595A1 (en)*2001-03-132002-09-19Kenjiro UedaEncryption method, decryption method, and recording and reproducing apparatus
US20020169971A1 (en)*2000-01-212002-11-14Tomoyuki AsanoData authentication system
US20020188567A1 (en)*1999-11-092002-12-12Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
US20020194613A1 (en)*2001-06-062002-12-19Unger Robert AllanReconstitution of program streams split across multiple program identifiers
US20020196939A1 (en)*2001-06-062002-12-26Unger Robert AllanDecoding and decryption of partially encrypted information
US20030048899A1 (en)*2001-09-102003-03-13Spacey Simon AlanMethod and apparatus for securing electronic information
US20030081773A1 (en)*2001-10-222003-05-01Takayuki SugaharaMethod and apparatus for encrypting and decrypting information
US20030086609A1 (en)*2001-11-022003-05-08International Business Machines CorporationParity-grid steganographic method and apparatus
US20030123664A1 (en)*2002-01-022003-07-03Pedlow Leo M.Encryption and content control in a digital broadcast system
US20030130954A1 (en)*1998-07-312003-07-10Carr J. ScottPostal applications including digital watermarks
US20030133570A1 (en)*2002-01-022003-07-17Candelore Brant L.Star pattern partial encryption
US20030142130A1 (en)*2001-12-032003-07-31Eiji KawaguchiElectronic mailing system
US20030145329A1 (en)*2002-01-022003-07-31Candelore Brant L.Selective encryption for video on demand
US20030152226A1 (en)*2002-01-022003-08-14Candelore Brant L.Slice mask and moat pattern partial encryption
US20030159139A1 (en)*2002-01-022003-08-21Candelore Brant L.Video slice and active region based dual partial encryption
US20030159140A1 (en)*2002-01-022003-08-21Candelore Brant L.Selective encryption to enable multiple decryption keys
US20030174837A1 (en)*2002-01-022003-09-18Candelore Brant L.Content replacement by PID mapping
US20030174844A1 (en)*1999-03-302003-09-18Candelore Brant L.Method and apparatus for protecting the transfer of data
US6643384B1 (en)*1999-03-312003-11-04Victor Company Of Japan, Ltd.Watermark data hiding apparatus, a method of hiding watermark data, a method of transmitting data including watermark data, a recording medium storing data including watermark data, a data and watermark data reading apparatus, and a method of reading data and watermark data
WO2003059039A3 (en)*2002-01-022003-11-20Sony Electronics IncTime division partial encryption
US20030222994A1 (en)*2002-05-282003-12-04Sony Electronics Inc.Method and apparatus for synchronizing dynamic graphics
US20030232594A1 (en)*2002-06-122003-12-18Interdigital Technology CorporationMethod and apparatus for delivering multimedia multicast services over wireless communication systems
US20040047470A1 (en)*2002-09-092004-03-11Candelore Brant L.Multiple partial encryption using retuning
US20040049688A1 (en)*2001-06-062004-03-11Candelore Brant L.Upgrading of encryption
US20040073917A1 (en)*2002-01-022004-04-15Sony CorporationSystem and method for partially encrypted multimedia stream
US20040079800A1 (en)*2002-10-292004-04-29Fuji Xerox Co., Ltd.Document verification system
US20040088552A1 (en)*2002-11-052004-05-06Candelore Brant L.Multi-process descrambler
US20040102379A1 (en)*1996-08-302004-05-27The Johns Hopkins University School Of MedicineFibroblast growth factor homologous factors (FHFs) and methods of use
US20040151314A1 (en)*1999-03-302004-08-05Candelore Brant L.Method and apparatus for securing control words
US20040165586A1 (en)*2003-02-242004-08-26Read Christopher JensenPID filters based network routing
US20040165727A1 (en)*2003-02-202004-08-26Secure Data In Motion, Inc.System for on-line and off-line decryption
US20040177262A1 (en)*2003-03-072004-09-09Samsung Electronics Co., Ltd.Method of protecting data saved to recording medium and disk drive adopting the method
US20040187161A1 (en)*2003-03-202004-09-23Cao Adrean T.Auxiliary program association table
US6798885B1 (en)*1999-04-292004-09-28International Business Machines Corp.Method and apparatus for encoding security information in a MIDI datastream
US20040205812A1 (en)*2000-06-222004-10-14Candelore Brant L.Method and apparatus for routing program data in a program viewing unit
US20040240668A1 (en)*2003-03-252004-12-02James BonanContent scrambling with minimal impact on legacy devices
US20050021970A1 (en)*2003-07-212005-01-27Curtis ReeseEmbedded data layers
US20050028193A1 (en)*2002-01-022005-02-03Candelore Brant L.Macro-block based content replacement by PID mapping
US20050036067A1 (en)*2003-08-052005-02-17Ryal Kim AnnonVariable perspective view of video images
US20050041885A1 (en)*2003-08-222005-02-24Russo Anthony P.System for and method of generating rotational inputs
US20050058267A1 (en)*2003-08-052005-03-17Martin Thomas J.Three-way call detection using steganography
US20050063541A1 (en)*2002-11-052005-03-24Candelore Brant L.Digital rights management of a digital device
US20050066357A1 (en)*2003-09-222005-03-24Ryal Kim AnnonModifying content rating
US20050097598A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Batch mode session-based encryption of video on demand content
US20050094809A1 (en)*2003-11-032005-05-05Pedlow Leo M.Jr.Preparation of content for multiple conditional access methods in video on demand
US20050097596A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Re-encrypted delivery of video-on-demand content
US20050097597A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Hybrid storage of video on demand content
US20050097614A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Bi-directional indices for trick mode video-on-demand
US20050094808A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Dynamic composition of pre-encrypted video on demand content
US20050102702A1 (en)*2003-11-122005-05-12Candelore Brant L.Cablecard with content manipulation
AU781797B2 (en)*2000-03-172005-06-16International Business Machines CorporationStream continuity enforcement
US20050129233A1 (en)*2003-12-162005-06-16Pedlow Leo M.Jr.Composite session-based encryption of Video On Demand content
RU2257010C2 (en)*2002-03-272005-07-20Государственное предприятие конструкторское бюро "СПЕЦВУЗАВТОМАТИКА"Method for steganographic conversion of binary data blocks
US20050169503A1 (en)*2004-01-292005-08-04Howell Mark J.System for and method of finger initiated actions
US20050169473A1 (en)*2004-02-032005-08-04Candelore Brant L.Multiple selective encryption with DRM
US20050179657A1 (en)*2004-02-122005-08-18Atrua Technologies, Inc.System and method of emulating mouse operations using finger image sensors
US20050192904A1 (en)*2002-09-092005-09-01Candelore Brant L.Selective encryption with coverage encryption
RU2262805C2 (en)*2002-12-252005-10-20Государственное образовательное учреждение высшего профессионального образования Самарский государственный технический университетMethod for steganographic protection of secret information
US20060013557A1 (en)*2004-07-012006-01-19Thomas PoslinskiSuppression of trick modes in commercial playback
US20060013554A1 (en)*2004-07-012006-01-19Thomas PoslinskiCommercial storage and retrieval
US20060013556A1 (en)*2004-07-012006-01-19Thomas PoslinskiCommercial information and guide
US20060013555A1 (en)*2004-07-012006-01-19Thomas PoslinskiCommercial progress bar
US20060013390A1 (en)*2002-04-222006-01-19Herz Frederick S MSystem and method for encrypting data in analog form
US20060106720A1 (en)*2004-11-122006-05-18Canon Kabushiki KaishaPrinting device, information processing apparatus, printing system, signature verifying method, signature adding method, and program
US20060155923A1 (en)*1995-07-312006-07-13Petro EstakhriIncreasing the memory performance of flash memory devices by writing sectors simultaneously to multiple flash memory devices
US20060168616A1 (en)*2002-12-132006-07-27Sony Electronics Inc.Targeted advertisement selection from a digital stream
US20060174264A1 (en)*2002-12-132006-08-03Sony Electronics Inc.Content personalization for digital conent
US20060179075A1 (en)*2005-02-072006-08-10Fay Jonathan EMethod and system for obfuscating data structures by deterministic natural data substitution
US20060227967A1 (en)*2005-04-112006-10-12Tomoki NishikawaData processing system and method
US20060271492A1 (en)*2000-02-152006-11-30Candelore Brant LMethod and apparatus for implementing revocation in broadcast networks
US7167825B1 (en)*1999-03-102007-01-23Thomas PotterDevice and method for hiding information and device and method for extracting information
US20070098228A1 (en)*2005-11-012007-05-03Atrua Technologies, IncDevices using a metal layer with an array of vias to reduce degradation
US20070150481A1 (en)*2005-12-272007-06-28Chen-Hwa SongFile distribution and access mechanism for file management and method thereof
US20070186287A1 (en)*2004-02-102007-08-09Slade Glen JData storage
US20070189710A1 (en)*2004-12-152007-08-16Pedlow Leo M JrContent substitution editor
US20070192864A1 (en)*2006-02-102007-08-16Bryant Eric DSoftware root of trust
US20070208668A1 (en)*2006-03-012007-09-06Candelore Brant LMultiple DRM management
US20070207681A1 (en)*2005-04-082007-09-06Atrua Technologies, Inc.System for and method of protecting an integrated circuit from over currents
US7286667B1 (en)2003-09-152007-10-23Sony CorporationDecryption system
US7292691B2 (en)2002-01-022007-11-06Sony CorporationProgressive video refresh slice detection
US7292690B2 (en)2002-01-022007-11-06Sony CorporationVideo scene change detection
US20080013808A1 (en)*2006-07-132008-01-17Russo Anthony PSystem for and method of assigning confidence values to fingerprint minutiae points
US20080172557A1 (en)*2007-01-162008-07-17Bally Gaming, Inc.Rom bios based trusted encrypted operating system
US20080201143A1 (en)*2007-02-152008-08-21Forensic Intelligence Detection OrganizationSystem and method for multi-modal audio mining of telephone conversations
US20080198978A1 (en)*2007-02-152008-08-21Olligschlaeger Andreas MSystem and method for three-way call detection
US20080247730A1 (en)*2000-03-022008-10-09Barton James MSystem and method for internet access to a personal television service
US20090003648A1 (en)*2000-02-142009-01-01Reed Alastair MColor Image or Video Processing
US20090138711A1 (en)*2007-11-212009-05-28Dennis HeimbignerSender Email Address Verification Using Reachback
US20090180025A1 (en)*2002-05-282009-07-16Sony CorporationMethod and apparatus for overlaying graphics on video
US7565546B2 (en)1999-03-302009-07-21Sony CorporationSystem, method and apparatus for secure digital content transmission
US20090210694A1 (en)*2003-05-292009-08-20Sony CorporationInformation transmission apparatus and method, information reception apparatus and method, and information-providing system
US20100061709A1 (en)*2008-09-052010-03-11Davender AgnihotriAd Menu for skipped advertisements
US7707117B1 (en)2003-03-242010-04-27Cybersource CorporationMethod and apparatus for communicating state information in an electronic transaction message
US7747853B2 (en)2001-06-062010-06-29Sony CorporationIP delivery of secure digital content
US20100202595A1 (en)*2009-02-122010-08-12Value-Added Communictions, Inc.System and method for detecting three-way call circumvention attempts
US20100250383A1 (en)*2009-03-262010-09-30Frazier John DSteganographic media payment system
US7831070B1 (en)2005-02-182010-11-09Authentec, Inc.Dynamic finger detection mechanism for a fingerprint sensor
US20110040964A1 (en)*2007-12-212011-02-17Lawrence Edward NussbaumSystem and method for securing data
US8041190B2 (en)2004-12-152011-10-18Sony CorporationSystem and method for the creation, synchronization and delivery of alternate content
US8185921B2 (en)2006-02-282012-05-22Sony CorporationParental control of displayed content using closed captioning
DE102012002639B3 (en)*2012-02-102013-04-11Bundesrepublik Deutschland, vertreten durch das Bundesministerium der Verteidigung, dieses vertreten durch das Bundesamt für Ausrüstung, Informationstechnik und Nutzung der BundeswehrTransmission method for hidden data communication, particularly via radio communication, involves encrypting message with encryption key in initial encrypted message, where web message is encoded in frequency variation pattern with web key
US20130101059A1 (en)*2011-10-032013-04-25Ira S. MoskowitzPre-modulation physical layer steganography
US20130163808A1 (en)*2011-12-212013-06-27Mark Gregory ClementsMethod and System of Digital Steganography
US20130185050A1 (en)*2012-01-132013-07-18International Business Machines CorporationConverting data into natural language form
US8527779B1 (en)*2010-09-012013-09-03Open Invention Network, LlcMethod and apparatus of performing distributed steganography of a data message
US8542825B2 (en)2007-10-152013-09-24Adobe Systems IncorporatedImparting cryptographic information in network communications
US20140006800A1 (en)*2012-07-022014-01-02Jeffrey E. BickfordMethod and apparatus for providing provably secure user input/output
US8626942B2 (en)2003-02-132014-01-07Adobe Systems IncorporatedReal-time priority-based media communication
US20140344584A1 (en)*2012-04-022014-11-20Intel CorporationSystems and methods for controlling access to supplemental content integrated into existing content
US8918644B2 (en)2008-10-152014-12-23Adobe Systems CorporationImparting real-time priority-based network communications in an encrypted communication session
US20150113269A1 (en)*2000-09-142015-04-23Kirsten AldrichHighly accurate security and filtering software
US9225838B2 (en)2009-02-122015-12-29Value-Added Communications, Inc.System and method for detecting three-way call circumvention attempts
US9235274B1 (en)2006-07-252016-01-12Apple Inc.Low-profile or ultra-thin navigation pointing or haptic feedback device
US9785330B1 (en)2008-02-132017-10-10Apple Inc.Systems for and methods of providing inertial scrolling and navigation using a fingerprint sensor calculating swiping speed and length
EP3149715A4 (en)*2014-05-262017-11-08Lazlo 326 LLCEncrypted electronic gaming ticket
US20170329993A1 (en)*2015-12-232017-11-16Tencent Technology (Shenzhen) Company LimitedMethod and device for converting data containing user identity
US9882879B1 (en)*2013-06-272018-01-30EMC IP Holding Company LLCUsing steganography to protect cryptographic information on a mobile device
US9891944B2 (en)*2015-10-292018-02-13International Business Machines CorporationSteganographic message passing between a virtual machine and a hypervisor
US9923936B2 (en)2016-04-072018-03-20Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US9930088B1 (en)2017-06-222018-03-27Global Tel*Link CorporationUtilizing VoIP codec negotiation during a controlled environment call
US10003462B2 (en)*2013-10-282018-06-19Huawei Technologies Co., Ltd.Key generating method and apparatus
US10019590B2 (en)2014-09-222018-07-10Azoteq (Pty) LtdSecure mobile phone document storage application
US10027797B1 (en)2017-05-102018-07-17Global Tel*Link CorporationAlarm control for inmate call monitoring
US10225396B2 (en)2017-05-182019-03-05Global Tel*Link CorporationThird party monitoring of a activity within a monitoring platform
US10572961B2 (en)2016-03-152020-02-25Global Tel*Link CorporationDetection and prevention of inmate to inmate message relay
US10860786B2 (en)2017-06-012020-12-08Global Tel*Link CorporationSystem and method for analyzing and investigating communication data from a controlled environment
US11463411B1 (en)*2021-11-022022-10-04Uab 360 ItHeader-based authentication in a virtual private network
CN115440234A (en)*2022-11-082022-12-06合肥工业大学 Audio Steganography Method and System Based on MIDI and Adversarial Generative Networks

Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4200700A (en)*1977-05-131980-04-29Idc Chemie AgMethod of after-foaming a mixture of a foam and a resin solution
US4405829A (en)*1977-12-141983-09-20Massachusetts Institute Of TechnologyCryptographic communications system and method
US5008935A (en)*1989-06-301991-04-16At&T Bell LaboratoriesEfficient method for encrypting superblocks of data
US5048086A (en)*1990-07-161991-09-10Hughes Aircraft CompanyEncryption system based on chaos theory
US5159633A (en)*1990-01-191992-10-27Canon Kabushiki KaishaMultimedia network system
US5177790A (en)*1989-12-191993-01-05Bull Cp8Method for generating a random number in a data processing system/and system for implementing the method
US5613004A (en)*1995-06-071997-03-18The Dice CompanySteganographic method and device
US5778074A (en)*1995-06-291998-07-07Teledyne Industries, Inc.Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4200700A (en)*1977-05-131980-04-29Idc Chemie AgMethod of after-foaming a mixture of a foam and a resin solution
US4405829A (en)*1977-12-141983-09-20Massachusetts Institute Of TechnologyCryptographic communications system and method
US5008935A (en)*1989-06-301991-04-16At&T Bell LaboratoriesEfficient method for encrypting superblocks of data
US5177790A (en)*1989-12-191993-01-05Bull Cp8Method for generating a random number in a data processing system/and system for implementing the method
US5159633A (en)*1990-01-191992-10-27Canon Kabushiki KaishaMultimedia network system
US5048086A (en)*1990-07-161991-09-10Hughes Aircraft CompanyEncryption system based on chaos theory
US5613004A (en)*1995-06-071997-03-18The Dice CompanySteganographic method and device
US5778074A (en)*1995-06-291998-07-07Teledyne Industries, Inc.Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Szepanski, W., "A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification," 1979 Carnahan Conference on Crime Countermeasures, pp. 101-109, May 1979.
Szepanski, W., A Signal Theoretic Method for Creating Forgery Proof Documents for Automatic Verification, 1979 Carnahan Conference on Crime Countermeasures, pp. 101 109, May 1979.*

Cited By (286)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20060155923A1 (en)*1995-07-312006-07-13Petro EstakhriIncreasing the memory performance of flash memory devices by writing sectors simultaneously to multiple flash memory devices
US20040102379A1 (en)*1996-08-302004-05-27The Johns Hopkins University School Of MedicineFibroblast growth factor homologous factors (FHFs) and methods of use
US20030130954A1 (en)*1998-07-312003-07-10Carr J. ScottPostal applications including digital watermarks
US7167825B1 (en)*1999-03-102007-01-23Thomas PotterDevice and method for hiding information and device and method for extracting information
US20040151314A1 (en)*1999-03-302004-08-05Candelore Brant L.Method and apparatus for securing control words
US20030174844A1 (en)*1999-03-302003-09-18Candelore Brant L.Method and apparatus for protecting the transfer of data
US7302058B2 (en)1999-03-302007-11-27Sony CorporationMethod and apparatus for securing control words
US7925016B2 (en)1999-03-302011-04-12Sony CorporationMethod and apparatus for descrambling content
US7565546B2 (en)1999-03-302009-07-21Sony CorporationSystem, method and apparatus for secure digital content transmission
US7730300B2 (en)1999-03-302010-06-01Sony CorporationMethod and apparatus for protecting the transfer of data
US20100020963A1 (en)*1999-03-302010-01-28Sony CorporationMethod and Apparatus for Descrambling Content
US6643384B1 (en)*1999-03-312003-11-04Victor Company Of Japan, Ltd.Watermark data hiding apparatus, a method of hiding watermark data, a method of transmitting data including watermark data, a recording medium storing data including watermark data, a data and watermark data reading apparatus, and a method of reading data and watermark data
US6798885B1 (en)*1999-04-292004-09-28International Business Machines Corp.Method and apparatus for encoding security information in a MIDI datastream
US8488788B2 (en)1999-11-092013-07-16Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
US20020188567A1 (en)*1999-11-092002-12-12Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
US20100183149A1 (en)*1999-11-092010-07-22Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
US7702589B2 (en)1999-11-092010-04-20Sony CorporationMethod for simulcrypting scrambled data to a plurality of conditional access devices
US20020169971A1 (en)*2000-01-212002-11-14Tomoyuki AsanoData authentication system
US20100235633A1 (en)*2000-01-212010-09-16Sony CorporationAuthentication and encryption utilizing command indentifiers
US7669052B2 (en)2000-01-212010-02-23Sony CorporationAuthentication and encryption utilizing command identifiers
US20100005301A1 (en)*2000-01-212010-01-07Sony CorporationAuthentication and encryption utlizing command identifiers
US7373506B2 (en)*2000-01-212008-05-13Sony CorporationData authentication system
US20070088961A1 (en)*2000-01-212007-04-19Sony CorporationData processing apparatus and data processing method
US20070136612A1 (en)*2000-01-212007-06-14Sony CorporationData processing apparatus and data processing method
US8375206B2 (en)2000-01-212013-02-12Sony CorporationAuthentication and encryption utilizing command identifiers
US7693300B2 (en)*2000-02-142010-04-06Digimarc CorporationColor image or video processing
US20090003648A1 (en)*2000-02-142009-01-01Reed Alastair MColor Image or Video Processing
US7567939B2 (en)2000-02-152009-07-28Sony CorporationMethod and apparatus for implementing revocation in broadcast networks
US20060271492A1 (en)*2000-02-152006-11-30Candelore Brant LMethod and apparatus for implementing revocation in broadcast networks
US7225164B1 (en)2000-02-152007-05-29Sony CorporationMethod and apparatus for implementing revocation in broadcast networks
US9826273B2 (en)2000-03-022017-11-21Tivo Solutions Inc.System and method for internet access to a personal television service
US20080247730A1 (en)*2000-03-022008-10-09Barton James MSystem and method for internet access to a personal television service
US7039189B1 (en)*2000-03-172006-05-02International Business Machines CorporationStream continuity enforcement
AU781797B2 (en)*2000-03-172005-06-16International Business Machines CorporationStream continuity enforcement
US20020001388A1 (en)*2000-06-072002-01-03Jung-Wan KoHigh speed copy protection method
US20040205812A1 (en)*2000-06-222004-10-14Candelore Brant L.Method and apparatus for routing program data in a program viewing unit
US7536549B2 (en)*2000-08-102009-05-19Toshikazu IshizakiMethods for generating a partially encrypted and compressed database and decrypting and decompressing the database
US20020019934A1 (en)*2000-08-102002-02-14Toshikazu IshizakiEncryption and decryption apparatuses, methods, and computer program products
US20150113269A1 (en)*2000-09-142015-04-23Kirsten AldrichHighly accurate security and filtering software
US9998471B2 (en)*2000-09-142018-06-12Kirsten AldrichHighly accurate security and filtering software
WO2002039222A3 (en)*2000-10-202003-03-06Wave Sys CorpSystem and method for managing trust between clients and servers
US20020107804A1 (en)*2000-10-202002-08-08Kravitz David WilliamSystem and method for managing trust between clients and servers
US20020124177A1 (en)*2001-01-172002-09-05Harper Travis KellyMethods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US7146501B2 (en)*2001-02-022006-12-05Nec CorporationMethod and apparatus for encrypting and decrypting data using encrypting key contained in electronic watermark
US20020108043A1 (en)*2001-02-022002-08-08Nec CorporationMethod and apparatus for encrypting and decrypting data using encrypting key contained in electronic watermark
US20020131595A1 (en)*2001-03-132002-09-19Kenjiro UedaEncryption method, decryption method, and recording and reproducing apparatus
US7155011B2 (en)*2001-03-132006-12-26Victor Company Of Japan, LimitedEncryption method, decryption method, and recording and reproducing apparatus
US20030046686A1 (en)*2001-06-062003-03-06Candelore Brant L.Time division partial encryption
US7124303B2 (en)2001-06-062006-10-17Sony CorporationElementary stream partial encryption
US7747853B2 (en)2001-06-062010-06-29Sony CorporationIP delivery of secure digital content
US20020196939A1 (en)*2001-06-062002-12-26Unger Robert AllanDecoding and decryption of partially encrypted information
US7350082B2 (en)2001-06-062008-03-25Sony CorporationUpgrading of encryption
US7151831B2 (en)2001-06-062006-12-19Sony CorporationPartial encryption and PID mapping
US20020194613A1 (en)*2001-06-062002-12-19Unger Robert AllanReconstitution of program streams split across multiple program identifiers
US7336787B2 (en)2001-06-062008-02-26Sony CorporationCritical packet partial encryption
US20060262926A1 (en)*2001-06-062006-11-23Candelore Brant LTime division partial encryption
US7139398B2 (en)2001-06-062006-11-21Sony CorporationTime division partial encryption
US7127619B2 (en)2001-06-062006-10-24Sony CorporationDecoding and decryption of partially encrypted information
US7751560B2 (en)2001-06-062010-07-06Sony CorporationTime division partial encryption
US7895616B2 (en)2001-06-062011-02-22Sony CorporationReconstitution of program streams split across multiple packet identifiers
US20040049688A1 (en)*2001-06-062004-03-11Candelore Brant L.Upgrading of encryption
US20030081776A1 (en)*2001-06-062003-05-01Candelore Brant L.Elementary stream partial encryption
US7287168B2 (en)2001-06-062007-10-23Sony CorporationPartial encryption and PID mapping
US20070271470A9 (en)*2001-06-062007-11-22Candelore Brant LUpgrading of encryption
US20030048899A1 (en)*2001-09-102003-03-13Spacey Simon AlanMethod and apparatus for securing electronic information
US20030081773A1 (en)*2001-10-222003-05-01Takayuki SugaharaMethod and apparatus for encrypting and decrypting information
US20070291943A1 (en)*2001-10-222007-12-20Victor Company Of Japan, Ltd.Method and apparatus for encrypting and decrypting information
US7254234B2 (en)*2001-10-222007-08-07Victor Company Of Japan, Ltd.Method and apparatus for encrypting and decrypting information
US20030086609A1 (en)*2001-11-022003-05-08International Business Machines CorporationParity-grid steganographic method and apparatus
US6862362B2 (en)2001-11-022005-03-01International Business Machines CorporationParity-grid steganographic method and apparatus
US7231049B2 (en)*2001-12-032007-06-12Eiji KawaguchiElectronic mailing system
US20030142130A1 (en)*2001-12-032003-07-31Eiji KawaguchiElectronic mailing system
US7765567B2 (en)2002-01-022010-07-27Sony CorporationContent replacement by PID mapping
US7155012B2 (en)2002-01-022006-12-26Sony CorporationSlice mask and moat pattern partial encryption
US7302059B2 (en)2002-01-022007-11-27Sony CorporationStar pattern partial encryption
US7215770B2 (en)2002-01-022007-05-08Sony CorporationSystem and method for partially encrypted multimedia stream
US7823174B2 (en)2002-01-022010-10-26Sony CorporationMacro-block based content replacement by PID mapping
US7039938B2 (en)2002-01-022006-05-02Sony CorporationSelective encryption for video on demand
US20030159140A1 (en)*2002-01-022003-08-21Candelore Brant L.Selective encryption to enable multiple decryption keys
US20030123664A1 (en)*2002-01-022003-07-03Pedlow Leo M.Encryption and content control in a digital broadcast system
US20040073917A1 (en)*2002-01-022004-04-15Sony CorporationSystem and method for partially encrypted multimedia stream
US7292690B2 (en)2002-01-022007-11-06Sony CorporationVideo scene change detection
US20030159139A1 (en)*2002-01-022003-08-21Candelore Brant L.Video slice and active region based dual partial encryption
US7292691B2 (en)2002-01-022007-11-06Sony CorporationProgressive video refresh slice detection
US7376233B2 (en)2002-01-022008-05-20Sony CorporationVideo slice and active region based multiple partial encryption
WO2003059039A3 (en)*2002-01-022003-11-20Sony Electronics IncTime division partial encryption
US20050028193A1 (en)*2002-01-022005-02-03Candelore Brant L.Macro-block based content replacement by PID mapping
US20030133570A1 (en)*2002-01-022003-07-17Candelore Brant L.Star pattern partial encryption
US20030174837A1 (en)*2002-01-022003-09-18Candelore Brant L.Content replacement by PID mapping
US20030145329A1 (en)*2002-01-022003-07-31Candelore Brant L.Selective encryption for video on demand
US20030152226A1 (en)*2002-01-022003-08-14Candelore Brant L.Slice mask and moat pattern partial encryption
US7233669B2 (en)2002-01-022007-06-19Sony CorporationSelective encryption to enable multiple decryption keys
US7218738B2 (en)2002-01-022007-05-15Sony CorporationEncryption and content control in a digital broadcast system
RU2257010C2 (en)*2002-03-272005-07-20Государственное предприятие конструкторское бюро "СПЕЦВУЗАВТОМАТИКА"Method for steganographic conversion of binary data blocks
US7454020B2 (en)*2002-04-222008-11-18Herz Frederick S MSystem and method for encrypting data in pictorial data
US20060013390A1 (en)*2002-04-222006-01-19Herz Frederick S MSystem and method for encrypting data in analog form
US20030222994A1 (en)*2002-05-282003-12-04Sony Electronics Inc.Method and apparatus for synchronizing dynamic graphics
US7530084B2 (en)2002-05-282009-05-05Sony CorporationMethod and apparatus for synchronizing dynamic graphics
US20090180025A1 (en)*2002-05-282009-07-16Sony CorporationMethod and apparatus for overlaying graphics on video
US20030232594A1 (en)*2002-06-122003-12-18Interdigital Technology CorporationMethod and apparatus for delivering multimedia multicast services over wireless communication systems
US7120250B2 (en)2002-09-092006-10-10Sony CorporationContent distribution for multiple digital rights management
US20040047470A1 (en)*2002-09-092004-03-11Candelore Brant L.Multiple partial encryption using retuning
US7151833B2 (en)2002-09-092006-12-19Sony CorporationSelective encryption to enable trick play
US8818896B2 (en)2002-09-092014-08-26Sony CorporationSelective encryption with coverage encryption
US20040049694A1 (en)*2002-09-092004-03-11Candelore Brant L.Content distribution for multiple digital rights management
US20040049691A1 (en)*2002-09-092004-03-11Candelore Brant L.Selective encryption to enable trick play
US7242773B2 (en)2002-09-092007-07-10Sony CorporationMultiple partial encryption using retuning
US20050192904A1 (en)*2002-09-092005-09-01Candelore Brant L.Selective encryption with coverage encryption
US6948657B2 (en)*2002-10-292005-09-27Fuji Xerox Co., Ltd.Document verification system
US20040079800A1 (en)*2002-10-292004-04-29Fuji Xerox Co., Ltd.Document verification system
US20060198519A9 (en)*2002-11-052006-09-07Candelore Brant LDigital rights management of a digital device
US8572408B2 (en)2002-11-052013-10-29Sony CorporationDigital rights management of a digital device
US20050063541A1 (en)*2002-11-052005-03-24Candelore Brant L.Digital rights management of a digital device
US20040086127A1 (en)*2002-11-052004-05-06Candelore Brant L.Mechanism for protecting the transfer of digital content
US7711115B2 (en)2002-11-052010-05-04Sony CorporationDescrambler
US7724907B2 (en)2002-11-052010-05-25Sony CorporationMechanism for protecting the transfer of digital content
US20040088552A1 (en)*2002-11-052004-05-06Candelore Brant L.Multi-process descrambler
US7508942B2 (en)2002-11-052009-03-24Sony CorporationMulti-process descrambler
US20060168616A1 (en)*2002-12-132006-07-27Sony Electronics Inc.Targeted advertisement selection from a digital stream
US8667525B2 (en)2002-12-132014-03-04Sony CorporationTargeted advertisement selection from a digital stream
US8645988B2 (en)2002-12-132014-02-04Sony CorporationContent personalization for digital content
US20060174264A1 (en)*2002-12-132006-08-03Sony Electronics Inc.Content personalization for digital conent
RU2262805C2 (en)*2002-12-252005-10-20Государственное образовательное учреждение высшего профессионального образования Самарский государственный технический университетMethod for steganographic protection of secret information
US9083773B2 (en)2003-02-132015-07-14Adobe Systems IncorporatedReal-time priority-based media communication
US8626942B2 (en)2003-02-132014-01-07Adobe Systems IncorporatedReal-time priority-based media communication
US8315393B2 (en)*2003-02-202012-11-20Proofpoint, IncSystem for on-line and off-line decryption
US20040165727A1 (en)*2003-02-202004-08-26Secure Data In Motion, Inc.System for on-line and off-line decryption
US20110110524A1 (en)*2003-02-202011-05-12Proofpoint, Inc.System for on-line and off-line decryption
US7783044B2 (en)*2003-02-202010-08-24Proofpoint, Inc.System for on-line and off-line decryption
US20040165586A1 (en)*2003-02-242004-08-26Read Christopher JensenPID filters based network routing
US20040177262A1 (en)*2003-03-072004-09-09Samsung Electronics Co., Ltd.Method of protecting data saved to recording medium and disk drive adopting the method
US20090106562A1 (en)*2003-03-072009-04-23Samsung Electronics Co., Ltd.Method of protecting data saved to recording medium and data storage apparatus adopting method
US7953986B2 (en)2003-03-072011-05-31Samsung Electronics Co., Ltd.Method of protecting data saved to recording medium and data storage apparatus adopting method
US7472287B2 (en)*2003-03-072008-12-30Samsung Electronics Co., Ltd.Method of protecting data saved to recording medium and disk drive adopting the method
US7409702B2 (en)2003-03-202008-08-05Sony CorporationAuxiliary program association table
US20040187161A1 (en)*2003-03-202004-09-23Cao Adrean T.Auxiliary program association table
US7707117B1 (en)2003-03-242010-04-27Cybersource CorporationMethod and apparatus for communicating state information in an electronic transaction message
US7292692B2 (en)2003-03-252007-11-06Sony CorporationContent scrambling with minimal impact on legacy devices
US20040240668A1 (en)*2003-03-252004-12-02James BonanContent scrambling with minimal impact on legacy devices
US8145895B2 (en)*2003-05-292012-03-27Sony CorporationInformation transmission apparatus and method, information reception apparatus and method, and information-providing system
US20090210694A1 (en)*2003-05-292009-08-20Sony CorporationInformation transmission apparatus and method, information reception apparatus and method, and information-providing system
US20050021970A1 (en)*2003-07-212005-01-27Curtis ReeseEmbedded data layers
US20070269033A1 (en)*2003-08-052007-11-22Martin Thomas JThree-way call detection using steganography
US7248685B2 (en)2003-08-052007-07-24Inmate Telephone, Inc.Three-way call detection using steganography
US20050036067A1 (en)*2003-08-052005-02-17Ryal Kim AnnonVariable perspective view of video images
US7826604B2 (en)2003-08-052010-11-02Dsi-Iti, LlcThree-way call detection using steganography
US20050058267A1 (en)*2003-08-052005-03-17Martin Thomas J.Three-way call detection using steganography
US20050041885A1 (en)*2003-08-222005-02-24Russo Anthony P.System for and method of generating rotational inputs
US7587072B2 (en)2003-08-222009-09-08Authentec, Inc.System for and method of generating rotational inputs
US7286667B1 (en)2003-09-152007-10-23Sony CorporationDecryption system
US20050066357A1 (en)*2003-09-222005-03-24Ryal Kim AnnonModifying content rating
US20050097596A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Re-encrypted delivery of video-on-demand content
US7853980B2 (en)2003-10-312010-12-14Sony CorporationBi-directional indices for trick mode video-on-demand
US20050094808A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Dynamic composition of pre-encrypted video on demand content
US20050097614A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Bi-directional indices for trick mode video-on-demand
US20050097597A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Hybrid storage of video on demand content
US7346163B2 (en)2003-10-312008-03-18Sony CorporationDynamic composition of pre-encrypted video on demand content
US20050097598A1 (en)*2003-10-312005-05-05Pedlow Leo M.Jr.Batch mode session-based encryption of video on demand content
US7263187B2 (en)2003-10-312007-08-28Sony CorporationBatch mode session-based encryption of video on demand content
US7620180B2 (en)2003-11-032009-11-17Sony CorporationPreparation of content for multiple conditional access methods in video on demand
US20050094809A1 (en)*2003-11-032005-05-05Pedlow Leo M.Jr.Preparation of content for multiple conditional access methods in video on demand
US20050102702A1 (en)*2003-11-122005-05-12Candelore Brant L.Cablecard with content manipulation
US7343013B2 (en)2003-12-162008-03-11Sony CorporationComposite session-based encryption of video on demand content
US20050129233A1 (en)*2003-12-162005-06-16Pedlow Leo M.Jr.Composite session-based encryption of Video On Demand content
US7697729B2 (en)2004-01-292010-04-13Authentec, Inc.System for and method of finger initiated actions
US20050169503A1 (en)*2004-01-292005-08-04Howell Mark J.System for and method of finger initiated actions
US20050169473A1 (en)*2004-02-032005-08-04Candelore Brant L.Multiple selective encryption with DRM
US20070186287A1 (en)*2004-02-102007-08-09Slade Glen JData storage
US7584198B2 (en)*2004-02-102009-09-01Stegostik LimitedData storage
US20050179657A1 (en)*2004-02-122005-08-18Atrua Technologies, Inc.System and method of emulating mouse operations using finger image sensors
US20060013557A1 (en)*2004-07-012006-01-19Thomas PoslinskiSuppression of trick modes in commercial playback
US20060013555A1 (en)*2004-07-012006-01-19Thomas PoslinskiCommercial progress bar
US20060013554A1 (en)*2004-07-012006-01-19Thomas PoslinskiCommercial storage and retrieval
US20060013556A1 (en)*2004-07-012006-01-19Thomas PoslinskiCommercial information and guide
US7792760B2 (en)*2004-11-122010-09-07Canon Kabushiki KaishaPrinting device, information processing apparatus, printing system, signature verifying method, signature adding method, and program
US20060106720A1 (en)*2004-11-122006-05-18Canon Kabushiki KaishaPrinting device, information processing apparatus, printing system, signature verifying method, signature adding method, and program
US8041190B2 (en)2004-12-152011-10-18Sony CorporationSystem and method for the creation, synchronization and delivery of alternate content
US20100322596A9 (en)*2004-12-152010-12-23Pedlow Leo MContent substitution editor
US20070189710A1 (en)*2004-12-152007-08-16Pedlow Leo M JrContent substitution editor
US7895617B2 (en)2004-12-152011-02-22Sony CorporationContent substitution editor
US7672967B2 (en)*2005-02-072010-03-02Microsoft CorporationMethod and system for obfuscating data structures by deterministic natural data substitution
US20060179075A1 (en)*2005-02-072006-08-10Fay Jonathan EMethod and system for obfuscating data structures by deterministic natural data substitution
US7831070B1 (en)2005-02-182010-11-09Authentec, Inc.Dynamic finger detection mechanism for a fingerprint sensor
US20070207681A1 (en)*2005-04-082007-09-06Atrua Technologies, Inc.System for and method of protecting an integrated circuit from over currents
US8231056B2 (en)2005-04-082012-07-31Authentec, Inc.System for and method of protecting an integrated circuit from over currents
US20060227967A1 (en)*2005-04-112006-10-12Tomoki NishikawaData processing system and method
US7889864B2 (en)*2005-04-112011-02-15Panasonic CorporationData processing system and method
US7940249B2 (en)2005-11-012011-05-10Authentec, Inc.Devices using a metal layer with an array of vias to reduce degradation
US20070098228A1 (en)*2005-11-012007-05-03Atrua Technologies, IncDevices using a metal layer with an array of vias to reduce degradation
US20070150481A1 (en)*2005-12-272007-06-28Chen-Hwa SongFile distribution and access mechanism for file management and method thereof
US20070192864A1 (en)*2006-02-102007-08-16Bryant Eric DSoftware root of trust
US7870399B2 (en)2006-02-102011-01-11Arxan Defense SystemsSoftware trusted platform module and application security wrapper
US8185921B2 (en)2006-02-282012-05-22Sony CorporationParental control of displayed content using closed captioning
US7555464B2 (en)2006-03-012009-06-30Sony CorporationMultiple DRM management
US20070208668A1 (en)*2006-03-012007-09-06Candelore Brant LMultiple DRM management
US20080013808A1 (en)*2006-07-132008-01-17Russo Anthony PSystem for and method of assigning confidence values to fingerprint minutiae points
US7885436B2 (en)2006-07-132011-02-08Authentec, Inc.System for and method of assigning confidence values to fingerprint minutiae points
US9235274B1 (en)2006-07-252016-01-12Apple Inc.Low-profile or ultra-thin navigation pointing or haptic feedback device
US20090013166A1 (en)*2007-01-162009-01-08Bally Gaming, Inc.Rom bios based trusted encrypted operating system
US8429389B2 (en)2007-01-162013-04-23Bally Gaming, Inc.ROM BIOS based trusted encrypted operating system
US8171275B2 (en)2007-01-162012-05-01Bally Gaming, Inc.ROM BIOS based trusted encrypted operating system
US20080172557A1 (en)*2007-01-162008-07-17Bally Gaming, Inc.Rom bios based trusted encrypted operating system
US8542802B2 (en)2007-02-152013-09-24Global Tel*Link CorporationSystem and method for three-way call detection
US11789966B2 (en)2007-02-152023-10-17Global Tel*Link CorporationSystem and method for multi-modal audio mining of telephone conversations
US11258899B2 (en)2007-02-152022-02-22Dsi-Iti, Inc.System and method for three-way call detection
US9930173B2 (en)2007-02-152018-03-27Dsi-Iti, LlcSystem and method for three-way call detection
US10120919B2 (en)2007-02-152018-11-06Global Tel*Link CorporationSystem and method for multi-modal audio mining of telephone conversations
US11895266B2 (en)2007-02-152024-02-06Dsi-Iti, Inc.System and method for three-way call detection
US9621732B2 (en)2007-02-152017-04-11Dsi-Iti, LlcSystem and method for three-way call detection
US9552417B2 (en)2007-02-152017-01-24Global Tel*Link Corp.System and method for multi-modal audio mining of telephone conversations
US10601984B2 (en)2007-02-152020-03-24Dsi-Iti, LlcSystem and method for three-way call detection
US8942356B2 (en)2007-02-152015-01-27Dsi-Iti, LlcSystem and method for three-way call detection
US8731934B2 (en)2007-02-152014-05-20Dsi-Iti, LlcSystem and method for multi-modal audio mining of telephone conversations
US10853384B2 (en)2007-02-152020-12-01Global Tel*Link CorporationSystem and method for multi-modal audio mining of telephone conversations
US20080201143A1 (en)*2007-02-152008-08-21Forensic Intelligence Detection OrganizationSystem and method for multi-modal audio mining of telephone conversations
US20080198978A1 (en)*2007-02-152008-08-21Olligschlaeger Andreas MSystem and method for three-way call detection
US9055051B2 (en)2007-10-152015-06-09Adobe Systems IncorporatedImparting cryptographic information in network communications
US8542825B2 (en)2007-10-152013-09-24Adobe Systems IncorporatedImparting cryptographic information in network communications
US20090138711A1 (en)*2007-11-212009-05-28Dennis HeimbignerSender Email Address Verification Using Reachback
US20110040964A1 (en)*2007-12-212011-02-17Lawrence Edward NussbaumSystem and method for securing data
US8806207B2 (en)2007-12-212014-08-12Cocoon Data Holdings LimitedSystem and method for securing data
US9785330B1 (en)2008-02-132017-10-10Apple Inc.Systems for and methods of providing inertial scrolling and navigation using a fingerprint sensor calculating swiping speed and length
US20100061709A1 (en)*2008-09-052010-03-11Davender AgnihotriAd Menu for skipped advertisements
US8918644B2 (en)2008-10-152014-12-23Adobe Systems CorporationImparting real-time priority-based network communications in an encrypted communication session
US9225838B2 (en)2009-02-122015-12-29Value-Added Communications, Inc.System and method for detecting three-way call circumvention attempts
US10057398B2 (en)2009-02-122018-08-21Value-Added Communications, Inc.System and method for detecting three-way call circumvention attempts
US20100202595A1 (en)*2009-02-122010-08-12Value-Added Communictions, Inc.System and method for detecting three-way call circumvention attempts
US8630726B2 (en)2009-02-122014-01-14Value-Added Communications, Inc.System and method for detecting three-way call circumvention attempts
US20100250383A1 (en)*2009-03-262010-09-30Frazier John DSteganographic media payment system
US9619656B1 (en)*2010-09-012017-04-11Open Invention Network LlcMethod and apparatus of performing distributed steganography of a data message
US10360354B1 (en)*2010-09-012019-07-23Open Invention Network LlcMethod and apparatus of performing distributed steganography of a data message
US8527779B1 (en)*2010-09-012013-09-03Open Invention Network, LlcMethod and apparatus of performing distributed steganography of a data message
US20130101059A1 (en)*2011-10-032013-04-25Ira S. MoskowitzPre-modulation physical layer steganography
US20130163808A1 (en)*2011-12-212013-06-27Mark Gregory ClementsMethod and System of Digital Steganography
US9633010B2 (en)2012-01-132017-04-25International Business Machines CorporationConverting data into natural language form
US10169337B2 (en)2012-01-132019-01-01International Business Machines CorporationConverting data into natural language form
US9251143B2 (en)*2012-01-132016-02-02International Business Machines CorporationConverting data into natural language form
US9858270B2 (en)2012-01-132018-01-02International Business Machines CorporationConverting data into natural language form
US20130185050A1 (en)*2012-01-132013-07-18International Business Machines CorporationConverting data into natural language form
DE102012002639B3 (en)*2012-02-102013-04-11Bundesrepublik Deutschland, vertreten durch das Bundesministerium der Verteidigung, dieses vertreten durch das Bundesamt für Ausrüstung, Informationstechnik und Nutzung der BundeswehrTransmission method for hidden data communication, particularly via radio communication, involves encrypting message with encryption key in initial encrypted message, where web message is encoded in frequency variation pattern with web key
US9443096B2 (en)*2012-04-022016-09-13Intel CorporationSystems and methods for controlling access to supplemental content integrated into existing content
US8954748B2 (en)*2012-04-022015-02-10Intel CorporationSystems and methods for controlling access to supplemental content integrated into existing content
US20140344584A1 (en)*2012-04-022014-11-20Intel CorporationSystems and methods for controlling access to supplemental content integrated into existing content
US10045212B2 (en)2012-07-022018-08-07At&T Intellectual Property I, L.P.Method and apparatus for providing provably secure user input/output
US20140006800A1 (en)*2012-07-022014-01-02Jeffrey E. BickfordMethod and apparatus for providing provably secure user input/output
US9524394B2 (en)2012-07-022016-12-20At&T Intellectual Property I, L.P.Method and apparatus for providing provably secure user input/output
US9195838B2 (en)*2012-07-022015-11-24At&T Intellectual Property I, L.P.Method and apparatus for providing provably secure user input/output
US9882879B1 (en)*2013-06-272018-01-30EMC IP Holding Company LLCUsing steganography to protect cryptographic information on a mobile device
US10003462B2 (en)*2013-10-282018-06-19Huawei Technologies Co., Ltd.Key generating method and apparatus
US10115264B2 (en)2014-05-262018-10-30Lazlo 326, LlcEncrypted electronic gaming ticket
EP3149715A4 (en)*2014-05-262017-11-08Lazlo 326 LLCEncrypted electronic gaming ticket
US10019590B2 (en)2014-09-222018-07-10Azoteq (Pty) LtdSecure mobile phone document storage application
US9891944B2 (en)*2015-10-292018-02-13International Business Machines CorporationSteganographic message passing between a virtual machine and a hypervisor
US10025617B2 (en)*2015-10-292018-07-17International Business Machines CorporationSteganographic message passing between a virtual machine and a hypervisor
US9898322B2 (en)*2015-10-292018-02-20International Business Machines CorporationSteganographic message passing between a virtual machine and a hypervisor
US10878121B2 (en)*2015-12-232020-12-29Tencent Technology (Shenzhen) Company LimitedMethod and device for converting data containing user identity
US20170329993A1 (en)*2015-12-232017-11-16Tencent Technology (Shenzhen) Company LimitedMethod and device for converting data containing user identity
US12198214B2 (en)2016-03-152025-01-14Global Tel*Link CorporationDetection and prevention of inmate to inmate message relay
US11640644B2 (en)2016-03-152023-05-02Global Tel* Link CorporationDetection and prevention of inmate to inmate message relay
US10572961B2 (en)2016-03-152020-02-25Global Tel*Link CorporationDetection and prevention of inmate to inmate message relay
US11238553B2 (en)2016-03-152022-02-01Global Tel*Link CorporationDetection and prevention of inmate to inmate message relay
US11271976B2 (en)2016-04-072022-03-08Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US10277640B2 (en)2016-04-072019-04-30Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US10715565B2 (en)2016-04-072020-07-14Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US12149569B2 (en)2016-04-072024-11-19Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US9923936B2 (en)2016-04-072018-03-20Global Tel*Link CorporationSystem and method for third party monitoring of voice and video calls
US10027797B1 (en)2017-05-102018-07-17Global Tel*Link CorporationAlarm control for inmate call monitoring
US11044361B2 (en)2017-05-182021-06-22Global Tel*Link CorporationThird party monitoring of activity within a monitoring platform
US12095943B2 (en)2017-05-182024-09-17Global Tel*Link CorporationThird party monitoring of activity within a monitoring platform
US11563845B2 (en)2017-05-182023-01-24Global Tel*Link CorporationThird party monitoring of activity within a monitoring platform
US10225396B2 (en)2017-05-182019-03-05Global Tel*Link CorporationThird party monitoring of a activity within a monitoring platform
US10601982B2 (en)2017-05-182020-03-24Global Tel*Link CorporationThird party monitoring of activity within a monitoring platform
US12175189B2 (en)2017-06-012024-12-24Global Tel*Link CorporationSystem and method for analyzing and investigating communication data from a controlled environment
US10860786B2 (en)2017-06-012020-12-08Global Tel*Link CorporationSystem and method for analyzing and investigating communication data from a controlled environment
US11526658B2 (en)2017-06-012022-12-13Global Tel*Link CorporationSystem and method for analyzing and investigating communication data from a controlled environment
US11757969B2 (en)2017-06-222023-09-12Global Tel*Link CorporationUtilizing VoIP codec negotiation during a controlled environment call
US9930088B1 (en)2017-06-222018-03-27Global Tel*Link CorporationUtilizing VoIP codec negotiation during a controlled environment call
US11381623B2 (en)2017-06-222022-07-05Global Tel*Link GorporationUtilizing VoIP coded negotiation during a controlled environment call
US10693934B2 (en)2017-06-222020-06-23Global Tel*Link CorporationUtilizing VoIP coded negotiation during a controlled environment call
US11750567B2 (en)*2021-11-022023-09-05Uab 360 ItHeader-based authentication in a virtual private network
US20230140782A1 (en)*2021-11-022023-05-04Uab 360 ItHeader-based authentication in a virtual private network
US11777904B2 (en)*2021-11-022023-10-03Uab 360 ItHeader-based authentication in a virtual private network
US20230136190A1 (en)*2021-11-022023-05-04Uab 360 ItHeader-based authentication in a virtual private network
US12120094B2 (en)*2021-11-022024-10-15Uab 360 ItHeader-based authentication in a virtual private network
US11463411B1 (en)*2021-11-022022-10-04Uab 360 ItHeader-based authentication in a virtual private network
CN115440234A (en)*2022-11-082022-12-06合肥工业大学 Audio Steganography Method and System Based on MIDI and Adversarial Generative Networks

Similar Documents

PublicationPublication DateTitle
US6011849A (en)Encryption-based selection system for steganography
US7738660B2 (en)Cryptographic key split binding process and apparatus
US6549623B1 (en)Cryptographic key split combiner
JP3229148B2 (en) Encryption method and system
US6021203A (en)Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security
CN108667595B (en) A compression and encryption method for large data files
US7676040B2 (en)Changing encryption key of encrypted data
EP0983541B1 (en)Method and apparatus for signing and sealing objects
US7212632B2 (en)Cryptographic key split combiner
KR970067054A (en) How to Create and Distribute Password Envelopes
JPH103256A (en)Ciphering method and device therefor, recording method, decoding method and device therefor and recording medium
JPH08328962A (en) A system consisting of a terminal and a memory card connected to the terminal
WO1998036520A1 (en)Cryptographic key split combiner
WO1999010859A2 (en)Steganographic encryption system for secure data
US6088456A (en)Data encryption technique
JP2002185443A (en) Private key management method
JPH11215117A (en)Method and device for key encoding and recovery
CN112347493A (en) A kind of OFD document encryption and decryption and de-encryption and graying method
JPH10271107A (en) Data encryption method and device
JPH08107506A (en)Communication equipment
AU753951B2 (en)Voice and data encryption method using a cryptographic key split combiner
Adebayo et al.Data Privacy System Using Steganography and Cryptography
JP2002544690A (en) Systems, devices and methods for secure communication and access control
KR20020025343A (en)Apparatus and Method for encryption and decryption of file using base key and one-time key
Isewon et al.Implementation of a File Encryption Software “Hyde” using RIJNDAEL Algorithm (AES)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SYNDATA TECHNOLOGIES, INC., NEW JERSEY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ORRIN, STEVEN M.;REEL/FRAME:008776/0831

Effective date:19970812

ASAssignment

Owner name:GARFIELD GROUP, LC, THE, NEW JERSEY

Free format text:EXECUTION LEVY VIA JUDGMENT;ASSIGNOR:SYNDATA TECHNOLOGIES, INC.;REEL/FRAME:013447/0436

Effective date:20011101

ASAssignment

Owner name:GARFIELD GROUP, LC THE, NEW JERSEY

Free format text:EXECUTION LEVY VIA JUDGMENT;ASSIGNOR:SYNDATA TECHNOLOGIES, INC.;REEL/FRAME:013484/0730

Effective date:20011101

REMIMaintenance fee reminder mailed
LAPSLapse for failure to pay maintenance fees
STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20030104


[8]ページ先頭

©2009-2025 Movatter.jp